逆碼 的英文怎麼說

中文拼音 []
逆碼 英文
anticode
  • : Ⅰ形容詞1 (方向相反) contrary; counter 2 [數學] inverse; converse Ⅱ動詞1 (抵觸; 不順從) go aga...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  1. 100 prizes : an infantile epistle, dated, small em monday, reading : capital pee papli comma capital aitch how are you note of interrogation capital eye i am very well full stop new paragraph signature with flourishes capital em milly no stop : a cameo brooch, property of ellen bloom born higgins, deceased : 3 typewritten letters, addressee, henry flower, c o p. o. westland row, addresser, martha clifford, c o p. o. dolphin s barn : the transliterated name and address of the addresser of the 3 letters in reserved alphabetic boustrophedontic punctated quadrilinear cryptogram vowels suppressed n. igs. wi. uu

    三封打字信,收信人為:亨利弗羅爾,韋斯特蘭橫街郵政局轉交發信人為:瑪莎克利弗德,海豚倉巷郵政局收轉。三信的發信人住址姓名被改寫為字母交互綴式附有句號分作四行的密母音字母略之如下: nigs wiuuoxwoksmhyim 296英國周刊現代社會297的一張剪報:論女學校中的體罰。一截粉紅色緞帶,這是一八九九年系在一顆復活節彩蛋上的。
  2. Firstly, chromatism analysis and wavelet transform are used for color image compression coding. in this method, one of the three color components of a color image ( for example the g component of a rgb color image ) is coded using wavelet transform, and the chromatism between g and other two color components rg = r - g, bg = b - g is coded respectively using chromatism analysis. during decoding, g ~ is first reconstructed using wavelet inverse transform and inverse quantisation, and rg, bg are reconstructed using chromatism analysis inverse transform ; then r, b are calculated by r = g + rg and b = g + bg respectively

    其一是應用色差分析和小波變換對彩色圖象進行壓縮編,該方法是對彩色圖象的三個色彩分量之一,如rgb圖象的g進行小波變換編,而對g與另兩個色彩分量的差值(即rg = r - g和bg = b - g )進行色差分析編,解則是通過反量化和小波變換得到g ^ ,通過色差分析的變換得到兩個重構的色差rg ^和bg ^ ,再算出r ^ = g ^ + rg ^ 、 b ^ = g ^ + bg ^ ,最後由r ^ 、 g ^ 、 b ^重構圖象。
  3. The first kind of algorithm is based on s - box controlled by key, the algorithm distinguishes most of other block ciphers, its visible quality is that its s - box is not regular and fixative, but controlled by block cipher ' s key. the second kind of algorithm is based on smn ( d ) array code, it makes full use of the visible quality of smn ( d ) array code possessing big code distance ( d ). the thesis discusses the two algorithms " reversibility, security and their qualities, the

    第一種是基於「 s -盒由密鑰控制」的變結構分組密,該演算法區別于其它大部分分組密最大的特點是它的s -盒不是固定不變的而是由密鑰控制產生;第二種是基於smn ( d )陣列編的變結構分組密,該演算法充分利用了smn ( d )陣列編具有距大的特點;文中對這兩個演算法的可性、安全性及其性能等進行了探討和分析,分析結果認為這兩個變結構演算法正確、有效且安全。
  4. Secondly, a nonbinary type - ii harq based on invertible rs codes is proposed

    其次,提出了基於可逆碼的第二類多進制harq 。
  5. Sod2 from schizosaccharomyces pombe, which encodes a protein with homology to bacterial and mammalia na + / h + antiporters in plasma membrane and responses to efflux of na +, is an important gene i nvolving in homeostasis. though sod2 gene has been cloned, ectopic expression of sod2 in high plants has not been reported

    Sod2在裂殖酵母( schizosaccharomycespombe )中編位於質膜上的na ~ + h ~ +向轉運蛋白,控制na ~ +外排,對于保持裂殖酵母細胞的離子均衡非常重要。
  6. 138 variable length coding ( vlc ) : a reversible procedure for entropy coding that assigns shorter bit strings to symbols expected to be more frequent and longer bit strings to symbols expected to be less frequent

    可變長編vlc :一種可熵編,為出現頻率高的符號分配少的位,為出現頻率低的符號更多的位。
  7. This sequence emergences fourteen times from 1000 ests library indicts that it is a middle affluently gene in cdna library. the cdna of 634 basepairs contains an open reading frame of 339 nucleotides encoding a novel nonspecific lipid transfer protein. the first 23 amino acids constitute the putative signal peptide, characteristic for targeting to the secretory pathway

    測得th - nsltp序列全長為634bp ,含有一個非特異性脂轉移蛋白與植物耐性的相關性研究編112個氨基酸的閱讀框架, n端的23個氨基酸組成一段信號肽序列,表明它可能和分泌有關。
  8. The adjoint code technique is employed for projecting the adjoint programs of betts - miller cumulus convection scheme of lasg - rem model and their correctness is verified, indicating that the adjoint program and its nonlinear program are converse in theory

    採用伴隨方法構造了lasg - rem模式的betts對流參數化方案的伴隨程序,並對其正確性進行了檢驗,結果表明編制的betts方案的伴隨程序與非線性程序在理論上是可的。
  9. The algorithm can not only eliminate the influence of the cumulative errors of the photoelectric code recorder, but also it can satisfy the requirement of the real - time control. a direct inverse model controller of fuzzy neural network with changeable structure based on takagi - sugeno inference is presented and it is used to the motion control of mobile robot. in order to avoid the obstacles successfully, detection results from ccd and ultrasonic sensors are fused by a fuzzy neural network, which acts as an avoidance controller

    包括移動機器人的融合自定位問題:移動機器人利用光電編器進行自定位,同時用擴展卡爾曼濾波器融合多個超聲波傳感器的測量值,採用回朔演算法將融合值用於復位光電編器,消除了光電編器累積誤差的影響,並能滿足實時控制的要求:並提出一種基於takagi - sugeno模型的變結構模糊神經網路直接模型控制器,並應用於移動機器人的運動控制;利用模糊神經網路避障控制器融合ccd攝象機與超聲波傳感器探測到的環境信息,以實現機器人的安全避障。
  10. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密體制的優點及研究現狀;其次研究了橢圓曲線密體制的基本理論;第三,分析了橢圓曲線密的安全性並介紹了密鑰共享,加密,數字簽名等橢圓曲線密體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線密體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密體制,包括ecdh , eces , ecdsa 。
  11. In this research, the wheat, rice and tobacco with salt treatment were used as experimental materials to study the molecular mechanism of stress - tolerance in plant and make the relative gene engineering research. the main results are as following : 1. a novel ca2 + channel gene, named as tatpc1, was isolated from wheat, encoding a two - pore voltage - gated channel protein

    本研究在總結當前植物鹽脅迫應答分子生物學研究進展的基礎上,以農作物小麥、水稻、煙草作為主要實驗材料,開展了植物耐分子機制和相關基因工程研究,主要結果為: 1從小麥中克隆到一個新的ca ~ ( 2 + )通道蛋白基因, tatpc1 ,它編的是一種細胞膜上兩孔電壓門控式通道蛋白。
  12. Automorphism group of a linear code is obtained with the help of the general linear group constructed by all invertible matrices, and it is illustrated by matrices generalized inverses

    給出了通過求解可矩陣構成的一般線性群,獲得線性的自同構群的方法,並利用矩陣廣義理論,對線性的自同構群進行進一步刻劃。
  13. Starting from compressed file, the video data passed huffman decoder, run length decoder, inverse adaptive quantilizer and inverse transform of wavelet

    從壓縮文件輸入開始,經過了霍夫曼解、遊程解、自適應量化的變換、小波變換。
  14. The dissertation combine the theory, with using integers dct transform to realize grey image lossless compress with the method of reversible color space integers transform and reversible integers dpcm prediction to realize lossless compress from grey image to color image with huffman coding method via visual c + + program

    本文借鑒整數dct變換實現灰度圖像無損壓縮的理論研究成果,將其與可的顏色空間整數變換和可的整數dpcm預測相結合,採用哈夫曼編方法,用vc編程實現了從灰度圖像到彩色圖像的無損壓縮。
  15. The inversionless bm algorithm in rs decoder is implemented with serial mode, which avoids the inversion computation and only needs 3 finite - field multipliers. thus, the complexity of hardware implementation has been mostly reduced. a 3 - level pipe - line processing architecture is also used in the hardware and the coding circuit in rs coder is optimized by using the characteristics of the finite - field constant multiplier

    Rs解器的設計採用無bm演算法,並利用串列方式來實現,不僅避免了求運算,而且只需用3個有限域乘法器就可以實現,大大的降低了硬體實現的復雜度,並且因為在硬體實現上,採用了3級流水線( pipe - line )的處理結構。
  16. Complex opcodes encoding would make it quite challenging to reverse engineer

    復雜的操作向是一種挑戰。
  17. The idea is to take a piece of plaintext and convert it to a piece of usually smaller ciphertext in a way that is irreversible

    其構想就是接收一段明,然後以一種不可的方式將它轉換成一段(通常更小)密文。
  18. In channel decoding, crc and interleave are reversible in mathematics. the decoding of rcpc is using viterbi decoding after filling the deleted bits ’ position with zero

    在通道解過程中, crc和交織在數學上都是可的, rcpc的譯是先將刪除的位置補零之後再對卷積使用viterbi譯
  19. How to apply modern cryptography to the copyright protection of digital contents is the focus of this dissertation, in which the traitor tracing problem of digital fingerprinting technology is researched in order that the issue of digital contents is run by natural commercial format

    本文中重點研究如何將現代密學技術應用到數字產品的版權保護中,即數字指紋技術中的叛者追蹤問題,以保證數字產品的出版發行能夠按正常商業形式運作。
  20. Throughput, reliability, and average delay have been analyzed, and compared with those of a binary type - ii harq and a turbo - tcm type - ii harq. nonbinary harq outperforms its binary counterpart in terms of throughput, reliability and average delay

    分析了該harq的流量、可靠性和平均時延,並與採用二進制可逆碼的第二類harq和採用turbo - tcm的第二類harq進行了比較。
分享友人